Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
2b76500955a5c2a474fc67836f542542_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2b76500955a5c2a474fc67836f542542_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Target
2b76500955a5c2a474fc67836f542542_JaffaCakes118
Size
324KB
MD5
2b76500955a5c2a474fc67836f542542
SHA1
f8d5370e9552342870340f55b907d89e8287ec63
SHA256
ac2345ab5f8eba539e066b594a6d1441c9b43efc8cde5dcb10231bbbf590e63d
SHA512
328f19b2a6851b577c4c1103df379325f1afc1209db6e65bce6f0a02b424009a6e3abcd734f10f45df77a325f5272c41f4b8401ff6b46c9322e6ba23f5720a27
SSDEEP
6144:pXqim0k0JHVKKCoZ9x4qBFjA9iw/k0NLEpd/vS7v:pXqUX4qB96ipUolS
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
c:\WorkCode\PIE\trunk\release\PIEService.pdb
VerQueryValueA
GetFileVersionInfoA
GetFileVersionInfoSizeA
GlobalAddAtomA
lstrcmpW
GlobalFindAtomA
GetFileAttributesA
GetCPInfo
GetOEMCP
HeapReAlloc
VirtualProtect
VirtualAlloc
VirtualQuery
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetSystemTimeAsFileTime
SetStdHandle
GetFileType
GetTimeFormatA
GetDateFormatA
SetCurrentDirectoryA
SetEnvironmentVariableA
ExitProcess
RaiseException
GlobalFlags
HeapSize
VirtualFree
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetStartupInfoA
QueryPerformanceCounter
GetTickCount
GetACP
IsValidCodePage
GetTimeZoneInformation
GetConsoleCP
GetConsoleMode
LCMapStringA
LCMapStringW
GetLocaleInfoW
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
GetStringTypeA
GetStringTypeW
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetCurrentDirectoryA
WritePrivateProfileStringA
WaitForSingleObject
InterlockedIncrement
GlobalGetAtomNameA
InterlockedDecrement
GetModuleFileNameW
LocalReAlloc
GlobalHandle
GlobalReAlloc
GetCurrentProcessId
LocalAlloc
FileTimeToLocalFileTime
GetFullPathNameA
GetVolumeInformationA
DuplicateHandle
GetFileSize
SetEndOfFile
UnlockFile
LockFile
SetFilePointer
GetThreadLocale
SetErrorMode
GlobalDeleteAtom
GetCurrentThread
GetCurrentThreadId
ConvertDefaultLocale
EnumResourceLanguagesA
GetLocaleInfoA
lstrcmpA
GlobalFree
GlobalAlloc
GlobalLock
GlobalUnlock
GetProcessHeap
GetVersionExA
GetSystemInfo
FormatMessageA
FileTimeToSystemTime
GetFileTime
CreateThread
TerminateProcess
GetCurrentProcess
GetStdHandle
CreateDirectoryA
GetLocalTime
GetModuleFileNameA
lstrcpyA
InitializeCriticalSection
LoadLibraryA
GetProcAddress
WriteFile
HeapCreate
MoveFileA
LeaveCriticalSection
DeleteFileA
HeapCompact
EnterCriticalSection
HeapAlloc
ReadFile
HeapDestroy
CreateFileA
HeapFree
FreeLibrary
SetLastError
DeleteCriticalSection
Sleep
FindClose
FindFirstFileA
ResumeThread
SuspendThread
MultiByteToWideChar
LockResource
WideCharToMultiByte
ConnectNamedPipe
CreateNamedPipeA
GetEnvironmentVariableA
GetVersion
InterlockedExchange
lstrlenA
CompareStringW
TlsGetValue
CompareStringA
TlsSetValue
TlsAlloc
TlsFree
CloseHandle
LocalFree
DisconnectNamedPipe
FlushFileBuffers
SizeofResource
LoadResource
FindResourceA
GetLastError
GetModuleHandleA
GetCommandLineA
RtlUnwind
GetCapture
GetClassLongA
SetPropA
GetPropA
RemovePropA
IsWindow
GetForegroundWindow
GetDlgItem
GetTopWindow
DestroyWindow
GetMessageTime
GetMessagePos
MapWindowPoints
SetForegroundWindow
GetClientRect
GetMenu
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
CopyRect
WinHelpA
LoadIconA
RegisterWindowMessageA
DefWindowProcA
CallWindowProcA
SetWindowLongA
SetWindowPos
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetWindow
GetDlgCtrlID
GetWindowRect
GetClassNameA
PtInRect
UnregisterClassA
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
SetCursor
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
GetFocus
ModifyMenuA
EnableMenuItem
CheckMenuItem
SetWindowsHookExA
CallNextHookEx
GetActiveWindow
IsWindowVisible
GetKeyState
PeekMessageA
GetCursorPos
ValidateRect
LoadCursorA
ShowWindow
DestroyMenu
GetDC
ReleaseDC
GetSysColor
GetSysColorBrush
GetWindowTextA
UnhookWindowsHookEx
GetWindowThreadProcessId
SendMessageA
GetParent
GetWindowLongA
GetLastActivePopup
IsWindowEnabled
EnableWindow
MessageBoxA
PostMessageA
PostQuitMessage
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
GetSystemMetrics
CharUpperA
DispatchMessageA
TranslateMessage
GetMessageA
SetWindowTextA
GetStockObject
DeleteDC
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
ExtTextOutA
TextOutA
RectVisible
GetClipBox
DeleteObject
GetDeviceCaps
CreateBitmap
SaveDC
RestoreDC
SetBkColor
SetTextColor
SetMapMode
PtVisible
GetFileTitleA
ClosePrinter
OpenPrinterA
DocumentPropertiesA
RegQueryValueA
RegEnumKeyA
RegDeleteKeyA
RegOpenKeyA
RegSetValueExA
RegCreateKeyExA
EqualSid
LookupAccountSidA
GetSidSubAuthorityCount
GetSidSubAuthority
GetTokenInformation
RegQueryValueExA
RegOpenKeyExA
OpenProcessToken
RegCloseKey
SetServiceStatus
LookupAccountNameA
GetAclInformation
InitializeSecurityDescriptor
GetSecurityInfo
CopySid
GetSecurityDescriptorControl
GetSecurityDescriptorLength
MakeSelfRelativeSD
GetSecurityDescriptorSacl
SetSecurityDescriptorDacl
GetSecurityDescriptorDacl
GetSecurityDescriptorGroup
IsValidSid
GetSecurityDescriptorOwner
GetLengthSid
GetAce
RegisterServiceCtrlHandlerExA
StartServiceCtrlDispatcherA
SHGetFolderPathA
PathFileExistsA
PathIsUNCA
PathStripToRootA
PathFindFileNameA
PathFindExtensionA
PathIsDirectoryA
CoUninitialize
CoInitializeEx
VariantInit
VariantClear
VariantChangeType
UnloadUserProfile
inflate
inflateInit2_
inflateEnd
Tcl_CreateCommand
Tcl_DeleteInterp
Tcl_EvalEx
Tcl_GetStringResult
Tcl_ProcCmd
Tcl_ResetResult
Tcl_CreateInterp
Tcl_CloneInterp
Tcl_DeleteClone
Tcl_SetResult
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ